-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of ACM 24 (1981) 28-30
-
(1981)
Communications of ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
2
-
-
0032137355
-
A password authentication method for contents communication on the Internet
-
Shimizu A., Horioka T., and Inagaki H. A password authentication method for contents communication on the Internet. IEICE Transactions on Communications E81-B 8 (1998) 1666-1673
-
(1998)
IEICE Transactions on Communications
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
3
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Fan C., Chan Y., and Zhang Z. Robust remote authentication scheme with smart cards. Computers & Security 24 (2005) 619-628
-
(2005)
Computers & Security
, vol.24
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
4
-
-
1542335451
-
Efficient password authenticated key agreement using smart card
-
Juang W. Efficient password authenticated key agreement using smart card. Computer & Security 23 (2004) 167-173
-
(2004)
Computer & Security
, vol.23
, pp. 167-173
-
-
Juang, W.1
-
5
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku W., and Chen S. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50 1 (2004) 204-207
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
6
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee C., Li L., and Hwang M. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.1
Li, L.2
Hwang, M.3
-
7
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian M., and Zunic N. Methods for protecting password transmission. Computers & Security 19 5 (2000) 466-469
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
8
-
-
33744725812
-
A hash-based strong-password authentication scheme without using smart cards
-
Ku W. A hash-based strong-password authentication scheme without using smart cards. ACM Operating Systems Review 38 1 (2004) 29-34
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.1
, pp. 29-34
-
-
Ku, W.1
-
9
-
-
33744757940
-
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
-
Ku W., Chen C., and Lee H. Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM Operating Systems Review 37 4 (2003) 9-25
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 9-25
-
-
Ku, W.1
Chen, C.2
Lee, H.3
-
10
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
Wen H., Lee T., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings of Communications 152 2 (2005) 138-143
-
(2005)
IEE Proceedings of Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.1
Lee, T.2
Hwang, T.3
-
11
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
Das M., Saxena A., Gulati V., and Phatak D. A novel remote user authentication scheme using bilinear pairings. Computers & Security 25 3 (2006) 184-189
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.1
Saxena, A.2
Gulati, V.3
Phatak, D.4
-
12
-
-
43049092163
-
-
J. Chou, Y. Chen, J. Lin, Improvement of Manik et al.'s remote user authentication scheme. http://eprint.iacr.org/2005/450.pdf
-
J. Chou, Y. Chen, J. Lin, Improvement of Manik et al.'s remote user authentication scheme. http://eprint.iacr.org/2005/450.pdf
-
-
-
-
13
-
-
43049091456
-
-
T. Goriparthi, Manik L. Das, A. Negi, A. Saxena, Cryptanalysis of recently proposed remote user authentication schemes. http://eprint.iacr.org/2006/028.pdf
-
T. Goriparthi, Manik L. Das, A. Negi, A. Saxena, Cryptanalysis of recently proposed remote user authentication schemes. http://eprint.iacr.org/2006/028.pdf
-
-
-
-
14
-
-
0033157651
-
An improvement of the password-based authentication protocol on security against replay attacks
-
Kwon T., Kang M., Juang S., and Song J. An improvement of the password-based authentication protocol on security against replay attacks. IEICE Transactions on Communications E82-B 7 (1999) 991-997
-
(1999)
IEICE Transactions on Communications
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Juang, S.3
Song, J.4
-
15
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
Ku W., Chen C., and Lee H. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communications E86-B 5 (2003) 1682-1684
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.1
Chen, C.2
Lee, H.3
-
16
-
-
0000873739
-
Repairable key distribution protocols for internet environments
-
Hwang T., and Ku W. Repairable key distribution protocols for internet environments. IEEE Transactions on Communications 43 5 (1995) 1947-1950
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.5
, pp. 1947-1950
-
-
Hwang, T.1
Ku, W.2
-
17
-
-
43049139427
-
-
NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 2004
-
NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 2004
-
-
-
-
18
-
-
43049137604
-
-
NIST FIPS PUB 197, Announcing the Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, Nov. 2001
-
NIST FIPS PUB 197, Announcing the Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, Nov. 2001
-
-
-
-
19
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11 (2004) 62-67
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 62-67
-
-
Lauter, K.1
|